Static task
static1
Behavioral task
behavioral1
Sample
2c4e75a8e88c3e88e76b275e18795980_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c4e75a8e88c3e88e76b275e18795980_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c4e75a8e88c3e88e76b275e18795980_JaffaCakes118
-
Size
179KB
-
MD5
2c4e75a8e88c3e88e76b275e18795980
-
SHA1
01a458bd04f1be422ea493d4cc97c426765b98d2
-
SHA256
a4c7016b3435eceded1446c2840fa1d88a81abf0e00824d6810196fdf0154189
-
SHA512
e71291eb3902e30333ecaceaa7f6b6e1f38d7cccebd34e66bd18b14e92890a3011c6b421daab6f4eb0b14b0a4d852b92e259b15de627c4d15a4c730a9901767e
-
SSDEEP
3072:qFdko5+4mJBerrZv8Nu8ZoCpyVtO5XQCBOeomDVCV1ihmp0JBAKQmG3l99:yio5StNuKXyVKACnBCKECJB29
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c4e75a8e88c3e88e76b275e18795980_JaffaCakes118
Files
-
2c4e75a8e88c3e88e76b275e18795980_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c61f5a8719cd7fa65798ecb6850cf52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
user32
GetKeyboardType
DestroyWindow
MessageBoxA
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPlacement
SetTimer
SetFocus
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
PostMessageA
PeekMessageA
OemToCharA
MessageBoxA
LoadIconA
KillTimer
IsWindowVisible
IsWindow
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowPlacement
GetDlgItemTextA
GetDlgItem
GetDialogBaseUnits
GetClassNameA
EnumChildWindows
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DestroyWindow
CheckRadioButton
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcmpiA
WriteFile
WinExec
SetFileTime
SetFilePointer
SetEnvironmentVariableA
ReadFile
MulDiv
LocalFileTimeToFileTime
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempFileNameA
GetShortPathNameA
GetModuleFileNameA
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentDirectoryA
FreeLibrary
ExpandEnvironmentStringsA
DosDateTimeToFileTime
DeleteFileA
CreateFileA
CreateDirectoryA
CloseHandle
Beep
shell32
SHGetFileInfoA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
InitCommonControls
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ